• the_lone_wolf
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      Those who don’t know about it go and read GNU replicantOS blog and wikipedia page

      • AItoothbrush@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        1 year ago

        It is. Custom roms modify very little of the code and they are all based on aosp(it is open source but google controlls the changes). The whole point of aosp is to create the illusion of choice but if you really want to avoid using google spyware you have to give up on most apps or go to extreme lenghts to use an alternative. The grapheneos project is really cool and usefull but it only patches the inherent (intended)problems of android and doesnt provide a real solution.

        • zwekihoyy
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          I’m unsure you have any idea what you’re talking about.

    • Boring
      link
      fedilink
      arrow-up
      4
      arrow-down
      3
      ·
      1 year ago

      And I’m sure you only use twofish because the NSA backdoored AES when they standardized it.

      • Joe BidetA
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        what does it have to do with Google’s business model being mass-surveillance, and/or them being caught several times collaborating with the NSA, the US army, etc.?

        I agree that the NSA backdooring stuff is a problem too… (or even a different facet of the same problem…) Yet, one doesn’t invalidate the other…

        • Boring
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          I’m just saying that collaboration with or association with spooks or glowies isn’t in itself a red flag.

          Many privacy and freedom granting software is made by these people.

          Take Tor for example, made by the navy to hide information from the public and anonymously attack networks of adversaries… Yet now is the NSA’s biggest obstacle in mass surveillance.

          • Joe BidetA
            link
            fedilink
            arrow-up
            3
            ·
            1 year ago

            I beg to disagree: the global interception capacities of the NSA in 2012 (as showed in the very few 2013 documents from Ed. Snowden that were made public) clearly were enough to routinely de-anonymize tor. By owning a certain percentage of the global internet traffic, you de facto own tor (can very precisely correlate what comes in and what goes out, and do that retrospectively when needed).

            and that was 10+ years aog

            Association with spooks is a red flag, for the multiple, endless ways they have been doing their shitfuckery, endangering the general public, the exceptional US citizens, and information/communication security at large… by weakening standards, by corrupting corporations to introduce (or leave open) some bugs, by infiltrating development teams, by pressuring operators to grant full access, by breaking and entering, etc…

            Anyone who doesnt see that as a problem has to be considered as part of it. Simple, basic rule.